{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:56:09Z","timestamp":1725533769823},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642023835"},{"type":"electronic","value":"9783642023842"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02384-2_23","type":"book-chapter","created":{"date-parts":[[2009,6,18]],"date-time":"2009-06-18T00:37:08Z","timestamp":1245285428000},"page":"368-385","source":"Crossref","is-referenced-by-count":17,"title":["Fast Elliptic-Curve Cryptography on the Cell Broadband Engine"],"prefix":"10.1007","author":[{"given":"Neil","family":"Costigan","sequence":"first","affiliation":[]},{"given":"Peter","family":"Schwabe","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"935","DOI":"10.1007\/978-3-540-69384-0_98","volume-title":"Computational Science \u2013 ICCS 2008","author":"W. Alvaro","year":"2008","unstructured":"Alvaro, W., Kurzak, J., Dongarra, J.: Fast and small short vector SIMD matrix multiplication kernels for the synergistic processing element of the CELL processor. In: Bubak, M., van Albada, G.D., Dongarra, J., Sloot, P.M.A. (eds.) ICCS 2008, Part I. LNCS, vol.\u00a05101, pp. 935\u2013944. Springer, Heidelberg (2008)"},{"key":"23_CR2","unstructured":"Bernstein, D.J.: qhasm: tools to help write high-speed software, \n                    \n                      http:\/\/cr.yp.to\/qhasm.html\n                    \n                    \n                   (accessed January 1, 2009)"},{"key":"23_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/11745853_14","volume-title":"Public Key Cryptography - PKC 2006","author":"D.J. Bernstein","year":"2006","unstructured":"Bernstein, D.J.: Curve25519: new Diffie-Hellman speed records. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol.\u00a03958, pp. 207\u2013228. Springer, Heidelberg (2006)"},{"key":"23_CR4","unstructured":"Bernstein, D.J., Lange, T. (eds.): eBACS: ECRYPT benchmarking of cryptographic systems (November 2008), \n                    \n                      http:\/\/bench.cr.yp.to\/\n                    \n                    \n                   (accessed January 1, 2009)"},{"key":"23_CR5","unstructured":"Costigan, N., Scott, M.: Accelerating SSL using the vector processors in IBM\u2019s Cell Broadband Engine for Sony\u2019s Playstation 3. In: Proceedings of SPEED workshop (2007), \n                    \n                      http:\/\/www.hyperelliptic.org\/SPEED\/"},{"issue":"6","key":"23_CR6","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory\u00a0IT-22(6), 644\u2013654 (1976), \n                    \n                      http:\/\/citeseer.ist.psu.edu\/diffie76new.html","journal-title":"IEEE Transactions on Information Theory"},{"key":"23_CR7","unstructured":"Fan, J., Sakiyama, K., Verbauwhede, I.: Elliptic curve cryptography on embedded multicore systems. In: Workshop on Embedded Systems Security - WESS 2007, Salzburg, Austria, pp. 17\u201322 (2007)"},{"key":"23_CR8","unstructured":"Galbraith, S.D., Lin, X., Scott, M.: Endomorphisms for faster elliptic curve cryptography on general curves (2008), \n                    \n                      http:\/\/eprint.iacr.org\/2008\/194"},{"key":"23_CR9","unstructured":"Gaudry, P., Thom\u00e9, E.: The mp\n                    \n                      \n                    \n                    $\\mathbb{F}_q$\n                   library and implementing curve-based key exchanges. In: Proceedings of SPEED workshop (2007), \n                    \n                      http:\/\/www.loria.fr\/~gaudry\/publis\/mpfq.pdf"},{"key":"23_CR10","series-title":"Lecture Notes in Computer Science","first-page":"34","volume-title":"Selected Areas in Cryptography \u2013 SAC 2008","author":"P. Grabher","year":"2009","unstructured":"Grabher, P., Gro\u00dfch\u00e4dl, J., Page, D.: On software parallel implementation of cryptographic pairings. In: Selected Areas in Cryptography \u2013 SAC 2008. LNCS, vol.\u00a05381, pp. 34\u201349. Springer, Heidelberg (to appear)"},{"key":"23_CR11","volume-title":"Guide to Elliptic Curve Cryptography","author":"D. Hankerson","year":"2003","unstructured":"Hankerson, D., Menezes, A.J., Vanstone, S.A.: Guide to Elliptic Curve Cryptography. Springer, Berlin (2003)"},{"key":"23_CR12","unstructured":"IBM DeveloperWorks. Cell broadband engine architecture and its first implementation (November 2005), \n                    \n                      http:\/\/www-128.ibm.com\/developerworks\/power\/library\/pa-cellperf\/"},{"key":"23_CR13","unstructured":"IBM DeveloperWorks. Cell broadband engine programming handbook (version 1.1) (April 2007), \n                    \n                      http:\/\/www-01.ibm.com\/chips\/techlib\/techlib.nsf\/techdocs\/9F820A5FFA3ECE8C8725716A0062585F"},{"key":"23_CR14","unstructured":"IBM DeveloperWorks. SPU assembly language specification (version 1.6) (September 2007), \n                    \n                      http:\/\/www-01.ibm.com\/chips\/techlib\/techlib.nsf\/techdocs\/EFA2B196893B550787257060006FC9FB"},{"key":"23_CR15","unstructured":"IBM DeveloperWorks. Example library API reference (version 3.1) (September 2008), \n                    \n                      http:\/\/www.ibm.com\/developerworks\/power\/cell\/documents.html\n                    \n                    \n                  ."},{"key":"23_CR16","unstructured":"IBM DeveloperWorks. SPE cryptographic library user documentation 1.0 (September 2008), \n                    \n                      http:\/\/www.ibm.com\/developerworks\/power\/cell\/documents.html\n                    \n                    \n                  ."},{"issue":"177","key":"23_CR17","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1090\/S0025-5718-1987-0866113-7","volume":"48","author":"P.L. Montgomery","year":"1987","unstructured":"Montgomery, P.L.: Speeding the Pollard and elliptic curve methods of factorization. Mathematics of Computation\u00a048(177), 243\u2013264 (1987)","journal-title":"Mathematics of Computation"},{"key":"23_CR18","unstructured":"Shimizu, K., Brokenshire, D., Peyravian, M.: Cell Broadband Engine support for privacy, security, and digital rights management applications. White paper, IBM (October 2005), \n                    \n                      http:\/\/www-01.ibm.com\/chips\/techlib\/techlib.nsf\/techdocs\/3F88DA69A1C0AC40872570AB00570985"},{"key":"23_CR19","unstructured":"Sotirov, A., Stevens, M., Appelbaum, J., Lenstra, A., Molnar, D., Osvik, D.A., de Weger, B.: MD5 considered harmful today (December 2008), \n                    \n                      http:\/\/www.win.tue.nl\/hashclash\/rogue-ca\/\n                    \n                    \n                   (accessed January 4, 2009)"},{"key":"23_CR20","unstructured":"Stevens, M., Lenstra, A., de Weger, B.: Nostradamus \u2013 predicting the winner of the 2008 US presidential elections using a Sony PlayStation 3 (November 2007), \n                    \n                      http:\/\/www.win.tue.nl\/hashclash\/Nostradamus\/\n                    \n                    \n                   (accessed January 4, 2009)"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 AFRICACRYPT 2009"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02384-2_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,25]],"date-time":"2019-01-25T07:30:06Z","timestamp":1548401406000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02384-2_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642023835","9783642023842"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02384-2_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}